Share
## https://sploitus.com/exploit?id=7F1831CC-811A-5BB6-9BBD-6BDA7F7B25A0
> 本仓库仅用作备份,非原创,请自行测试可用性

# CVE-2024-38077-EXP

【修复版,作者:qi4L】

有效范围:仅 Windows Server 2025

使用方法:

```
options:
  -h, --help            show this help message and exit
  --target_ip TARGET_IP
                        Target IP, eg: 192.168.120.1
  --evil_ip EVIL_IP     Evil IP, eg: 192.168.120.2
  --evil_dll_path EVIL_DLL_PATH
                        Evil dll path, eg: \smb\evil_dll.dll
  --check_vuln_exist CHECK_VULN_EXIST
                        Check vulnerability exist before exploit
```

https://github.com/qi4L/CVE-2024-38077

# CVE-2024-38077-POC

【伪代码,作者:zhiniangpeng】

漏洞作者已经发布分析文章第一篇:https://sites.google.com/site/zhiniangpeng/blogs/MadLicense (× 已删除)



![image](https://github.com/user-attachments/assets/ffd4ba94-074d-4104-b6bf-7ee536b45ac2)